The FBI is warning of a new wave of attacks carried out by the FIN7 APT group that is sending to the victims devices acting as a keyboard (HID Emulator USB) when plugged into a computer.
“Recently, the cybercriminal group FIN7,1 known for targeting such businesses through phishing emails, deployed an additional tactic of mailing USB devices via the United States Postal Service (USPS).” reads the alert issued by the FBI. “The mailed packages sometimes include items like teddy bears or gift cards to employees of target companies working in the Human Resources (HR), Information Technology (IT), or Executive Management (EM) roles,”
Upon connecting the device to a computer, it injects commands to download and execute a JavaScript backdoor tracked as GRIFFON.
One of these attacks was analyzed by experts from Trustwave, one of the clients of the cybersecurity firm received a letter was supposedly from Best Buy giving out a $50 gift card to its loyal customers. The letter also includes an apparently harmless USB drive that claims to contain a list of items to spend on.
The packages have been sent to several businesses, including retails, restaurants, hotels. The malicious devices were sent to employees in human resources, IT, or executive management departments.
The weaponized drive emulates keystrokes that launch a PowerShell command to retrieve malware from a remote server. The experts observed malicious code contacting domains or IP addresses in Russia.
It is quite easy to find development boards like Arduino that could be configured to emulate a human interface device (HID) such as keyboards and launch a pre-configured set of keystrokes to load and execute any sort of malware.
“To start the analysis, we inspected the drive for inscriptions such as serial numbers. At the head of the drive on the printed circuit board we saw “HW-374”. A quick Google search for this string found a “BadUSB Leonardo USB ATMEGA32U4” for sale on shopee.tw.” reads the analysis published by Trustwave.
“This USB device uses an Arduino microcontroller ATMEGA32U4 and was programmed to emulate a USB keyboard. Since PCs trust keyboard USB devices by default, once it is plugged in, the keyboard emulator can automatically inject malicious commands.”
Trustwave experts noticed two PowerShell commands that lead to displaying a fake message box warning of errors on the thumb drive.
The Powershell scripts then run third-stage JavaScript that gathers system information and drops other malware. According to the FBI’s alert, once gathered the information on the target, FIN7 threat actor starts to move laterally seeking administrative privileges.
“After this gathered information is sent to C&C server. The main Jscript code enters an infinite loop sleeping for 2 minutes in each loop iteration then getting a new command from the command and control.” continues the analysis.
“In summary, once a USB controller chip is reprogrammed to unintended use (in this case as an emulated USB keyboard) these devices could be used to launch an attack and infect unsuspecting users’ computer without them realizing it.” concludes Trustwave.
“These types of USB devices are widely known and used by security professionals. The fact that they are also cheap and readily available to anyone meant that it was just a matter of time to see this technique used by criminals “in the wild.”
Let me close with a comment from the popular white-hat hacker Luca Bongiorni, the evil mind behind @whid_injector & @potaebox.
“The fact that FIN7 and other cyber gangs started conducting attacks via USB sticks suggests that the defenses against spear-phishing are exponentially improving,” said Bongiorni.
“Probably soon, attackers will move from simple USB sticks to more advanced solutions like a USB cable (e.g. #USBsamurai or #EvilCrow). Using a “malicious implant” inside them attackers could conduct BADUSB type attacks. Let’s think of a mouse or a USB fan embedding #WHIDelite.“
An example of remote control via GSM network via a USB keyboard inside which a #WHIDelite is available here:
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – FIN7, hacking)
[adrotate banner=”5″]
[adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.